menu
{ "item_title" : "Engineering Secure Software and Systems", "item_author" : [" Jan Jürjens", "Frank Piessens", "Nataliia Bielova "], "item_description" : "Model-Based Security.- Detecting Code Reuse Attacks with a Model of Conformant Program Execution.- Security@Runtime: A Flexible MDE Approach to Enforce Fine-Grained Security Policies.- Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services.- Formal Methods.- Automated Formal Verification of Application-Specific Security Properties.- Fault-Tolerant Non-interference .- Quantitative Security Analysis for Programs with Low Input and Noisy Output.- A Modeling and Formal Approach for the Precise Specification of Security Patterns.- On the Relation between Redactable and Sanitizable Signature Schemes.- Idea: Towards a Working Fully Homomorphic Crypto-processor: Practice and the Secret Computer.- Web and Mobile Security.- Architectures for Inlining Security Monitors in Web Applications.- Automatic and Robust Client-Side Protection for Cookie-Based Sessions.- Security Testing of GSM Implementations.- Applications.- User-Centric Security Assessment of Software Configurations: A Case Study.- Idea: Security Engineering Principles for Day Two Car2X Applications.-Idea: Embedded Fault Injection Simulator on Smartcard.", "item_img_path" : "https://covers4.booksamillion.com/covers/bam/3/31/904/896/3319048961_b.jpg", "price_data" : { "retail_price" : "54.99", "online_price" : "54.99", "our_price" : "54.99", "club_price" : "54.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Engineering Secure Software and Systems|Jan Jürjens

Engineering Secure Software and Systems : 6th International Symposium, Essos 2014, Munich, Germany, February 26-28, 2014. Proceedings

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Model-Based Security.- Detecting Code Reuse Attacks with a Model of Conformant Program Execution.- Security@Runtime: A Flexible MDE Approach to Enforce Fine-Grained Security Policies.- Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services.- Formal Methods.- Automated Formal Verification of Application-Specific Security Properties.- Fault-Tolerant Non-interference .- Quantitative Security Analysis for Programs with Low Input and Noisy Output.- A Modeling and Formal Approach for the Precise Specification of Security Patterns.- On the Relation between Redactable and Sanitizable Signature Schemes.- Idea: Towards a Working Fully Homomorphic Crypto-processor: Practice and the Secret Computer.- Web and Mobile Security.- Architectures for Inlining Security Monitors in Web Applications.- Automatic and Robust Client-Side Protection for Cookie-Based Sessions.- Security Testing of GSM Implementations.- Applications.- User-Centric Security Assessment of Software Configurations: A Case Study.- Idea: Security Engineering Principles for Day Two Car2X Applications.-Idea: Embedded Fault Injection Simulator on Smartcard.

This item is Non-Returnable

Details

  • ISBN-13: 9783319048963
  • ISBN-10: 3319048961
  • Publisher: Springer
  • Publish Date: March 2014
  • Dimensions: 9.21 x 6.14 x 0.53 inches
  • Shipping Weight: 0.79 pounds
  • Page Count: 231

Related Categories

You May Also Like...

    1

BAM Customer Reviews